The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "SSCC"( http://dblp.L3S.de/Venues/SSCC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/sscc

Publication years (Num. hits)
2013 (40) 2014 (43) 2015 (50) 2016 (41) 2017 (35) 2018 (55) 2019 (30) 2020 (22) 2021 (1)
Publication types (Num. hits)
inproceedings(309) proceedings(8)
Venues (Conferences, Journals, ...)
SSCC(317)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 317 publication records. Showing 317 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Sabu M. Thampi, Guojun Wang 0001, Danda B. Rawat, Ryan K. L. Ko, Chun-I Fan (eds.) Security in Computing and Communications - 8th International Symposium, SSCC 2020, Chennai, India, October 14-17, 2020, Revised Selected Papers Search on Bibsonomy SSCC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Zbigniew Kotulski, Wojciech Niewolski, Tomasz Wojciech Nowak, Mariusz Sepczuk New Security Architecture of Access Control in 5G MEC. Search on Bibsonomy SSCC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Seema Nambiar, Nandakrishna, Chirag Tubakad, Adithya Kiran, Subramaniam Kalambur Multilevel Secure Container Deployment Framework in Edge Computing. Search on Bibsonomy SSCC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Ilia Odeski, Michael Segal 0001 Anomaly Detection in CAN-BUS Using Pattern Matching Algorithm. Search on Bibsonomy SSCC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Hetong Jiang, Taejun Choi, Ryan K. L. Ko Pandora: A Cyber Range Environment for the Safe Testing and Deployment of Autonomous Cyber Attack Tools. Search on Bibsonomy SSCC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Sabu M. Thampi, Gregorio Martínez Pérez, Ryan K. L. Ko, Danda B. Rawat (eds.) Security in Computing and Communications - 7th International Symposium, SSCC 2019, Trivandrum, India, December 18-21, 2019, Revised Selected Papers Search on Bibsonomy SSCC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Felix O. Olowononi, Danda B. Rawat, Chunmei Liu Trust-Based Adversarial Resiliency in Vehicular Cyber Physical Systems Using Reinforcement Learning. Search on Bibsonomy SSCC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Chintala Yehoshuva, R. Raja Adhithan, N. Nalla Anandakumar A Survey of Security Attacks on Silicon Based Weak PUF Architectures. Search on Bibsonomy SSCC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Belal Asad, Neetesh Saxena On the Feasibility of DoS Attack on Smart Door Lock IoT Network. Search on Bibsonomy SSCC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Paulo Ferreira, Mário Antunes 0002 Benchmarking Behavior-Based Intrusion Detection Systems with Bio-inspired Algorithms. Search on Bibsonomy SSCC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Jheng-Jia Huang, Chun-I Fan, Yu-Chen Hsu, Arijit Karati A Fast Authentication Scheme for Cross-Network-Slicing Based on Multiple Operators in 5G Environments. Search on Bibsonomy SSCC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Rinoy Macwan, Sankha Das, Manik Lal Das GIDS: Anomaly Detection Using Generative Adversarial Networks. Search on Bibsonomy SSCC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Betty Saridou, Gueltoum Bendiab, Stavros N. Shiaeles, Basil K. Papadopoulos Thermal Management in Large Data Centres: Security Threats and Mitigation. Search on Bibsonomy SSCC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Naga Venkata Hrushikesh Chunduri, Ashok Kumar Mohan A Forensic Analysis on the Availability of MQTT Network Traffic. Search on Bibsonomy SSCC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Houssem Mansouri, Al-Sakib Khan Pathan A Communication-Induced Checkpointing Algorithm for Consistent-Transaction in Distributed Database Systems. Search on Bibsonomy SSCC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Taiguo Qu, Wenjun Jiang, Dong Liu, Guojun Wang 0001 Deep Hierarchical App Recommendation with Dynamic Behaviors. Search on Bibsonomy SSCC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Eranga Bandara, Xueping Liang, Peter Foytik, Sachin Shetty, Nalin Ranasinghe, Kasun De Zoysa, Wee Keong Ng SaaS - Microservices-Based Scalable Smart Contract Architecture. Search on Bibsonomy SSCC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Teenu S. John, Tony Thomas Evading Static and Dynamic Android Malware Detection Mechanisms. Search on Bibsonomy SSCC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Vangara Saiprudhvi, R. Ramanathan 0001 Analysis of Orthogonal Time Frequency Space Transceiver in Baseband Environment. Search on Bibsonomy SSCC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Mohammed Asrar Ahmed, S. Ramachandram, Khaleel Ur Rahman Khan Conjunctive Keyword Forward Secure Ranked Dynamic Searchable Encryption Over Outsourced Encrypted Data. Search on Bibsonomy SSCC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Angeliki Kalapodi, Nicolas Sklavos 0001 The Concerns of Personal Data Privacy, on Calling and Messaging, Networking Applications. Search on Bibsonomy SSCC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Chinmay D. Kuchinad, N. Chiranjeevi, Kartik Vishnu Hegde, Shikha Tripathi Audio Steganography Using Multi LSB and IGS Techniques. Search on Bibsonomy SSCC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1N. P. Arun Kumar, Renganathan Laxmanan, S. Ram Kumar, Vobbilisetty Srinidh, R. Ramanathan 0001 Performance Study of Multi-target Tracking Using Kalman Filter and Hungarian Algorithm. Search on Bibsonomy SSCC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Meenakshi Suresh, V. Anil Kumar, M. Sethumadhavan 0001, P. P. Amritha Exploitation of HTTP/2 Proxies for Cryptojacking. Search on Bibsonomy SSCC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Saeed Ibrahim, Nawwaf Al Herami, Ebrahim Al Naqbi, Monther Aldwairi Detection and Analysis of Drive-by Downloads and Malicious Websites. Search on Bibsonomy SSCC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Faisal Alsakran, Gueltoum Bendiab, Stavros Shiaeles, Nicholas Kolokotronis Intrusion Detection Systems for Smart Home IoT Devices: Experimental Comparison Study. Search on Bibsonomy SSCC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Sampsa Rauti Man-in-the-browser Attack: A Case Study on Malicious Browser Extensions. Search on Bibsonomy SSCC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ghanshyam S. Bopche, Gopal N. Rai, D. R. Denslin Brabin, Babu M. Mehtre A Proximity-Based Measure for Quantifying the Risk of Vulnerabilities. Search on Bibsonomy SSCC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Shailendra Kumar Tripathi, Bhupendra Gupta, K. K. Soundra Pandian, Yumnam Jayanta Singh Secret Image Sharing Scheme for Gray-Level Images Using Toeplitz Matrix Based Stream Cipher. Search on Bibsonomy SSCC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1A. S. Ajeena Beegom, Gayatri Ashok Malware Detection in Android Applications Using Integrated Static Features. Search on Bibsonomy SSCC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Anindita Banerjee Security of Quantum Cryptography. Search on Bibsonomy SSCC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Gaurav Sarraf, M. S. Swetha Intrusion Prediction and Detection with Deep Sequence Modeling. Search on Bibsonomy SSCC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Khaled A. Al-Thelaya, El-Sayed M. El-Alfy Android Malware Detector Based on Sequences of System Calls and Bidirectional Recurrent Networks. Search on Bibsonomy SSCC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Paola Barra, Carmen Bisogni, Michele Nappi, David Freire-Obregón, Modesto Castrillón Santana Gotcha-I: A Multiview Human Videos Dataset. Search on Bibsonomy SSCC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1M. Priyatharishini, M. Nirmala Devi 0001 Realization of Re-configurable True Random Number Generator on FPGA. Search on Bibsonomy SSCC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Houssem Mansouri, Al-Sakib Khan Pathan A Resilient Hierarchical Checkpointing Algorithm for Distributed Systems Running on Cluster Federation. Search on Bibsonomy SSCC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Nhlakanipho C. Fakude, Paul Tarwireyi, Matthew O. Adigun The Impact of a Security Model in a Fog Computing Environment. Search on Bibsonomy SSCC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Sampsa Rauti Controlling Uncertainty with Proactive Cyber Defense: A Clausewitzian Perspective. Search on Bibsonomy SSCC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Rohini Bhosale, Madhumita Chatterjee Privacy Preserving Profile Matching in Mobile Social Networks: A Comprehensive Survey. Search on Bibsonomy SSCC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Tanja Hanauer, Wolfgang Hommel Enhancing Enterprise IT Security with a Visualization-Based Process Framework. Search on Bibsonomy SSCC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Abdulrahman Alruban, Muhammed Abduallah, Gueltoum Bendiab, Stavros Shiaeles, Marco Palomino Improving Sentiment Analysis of Arabic Tweets. Search on Bibsonomy SSCC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Sabu M. Thampi, Sanjay Madria, Guojun Wang 0001, Danda B. Rawat, José M. Alcaraz Calero (eds.) Security in Computing and Communications - 6th International Symposium, SSCC 2018, Bangalore, India, September 19-22, 2018, Revised Selected Papers Search on Bibsonomy SSCC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Sampsa Rauti Protecting Computer Systems from Cyber Attacks with Internal Interface Diversification. Search on Bibsonomy SSCC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1S. Sriram, K. Simran, R. Vinayakumar, S. Akarsh, K. P. Soman Towards Evaluating the Robustness of Deep Intrusion Detection Models in Adversarial Environment. Search on Bibsonomy SSCC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1K. Simran, Prathiksha Balakrishna, R. Vinayakumar, K. P. Soman Deep Learning Approach for Enhanced Cyber Threat Indicators in Twitter Stream. Search on Bibsonomy SSCC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Abhishek Kumar, P. Syam Kumar Efficient Ciphertext Policy Attribute Based Encryption (ECP-ABE) for Data Deduplication in Cloud Storage. Search on Bibsonomy SSCC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Divyans Mahansaria, Uttam Kumar Roy Secure Authentication Using One Time Contextual QR Code. Search on Bibsonomy SSCC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Qasem Abu Al-Haija, Ibrahim Marouf, Mohammad M. Asad, Pankaj Mishra Pipelined Implementation of Millar-Rabin Primality Tester Using Altera FPGA Kit. Search on Bibsonomy SSCC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Mohamed Ali Kazi, Steve Woodhead, Diane Gan Detecting the Zeus Banking Malware Using the Random Forest Binary Classification Algorithm and a Manual Feature Selection Process. Search on Bibsonomy SSCC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Shreyas Sriram, Susheel Polani Sathishkumar, J. Bhuvana Braille Based Steganography System Using Dynamic Key Exchange. Search on Bibsonomy SSCC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Marco Castaldo, Aniello Castiglione, Barbara Masucci, Michele Nappi, Chiara Pero Energy Awareness and Secure Communication Protocols: The Era of Green Cybersecurity. Search on Bibsonomy SSCC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Maria Pantopoulou, Nicolas Sklavos 0001, Ivana Ognjanovic On the Hardware Implementation Performance, of Face Recognition Techniques, for Digital Forensics. Search on Bibsonomy SSCC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Myriam Massardier-Meca, Antonio Ruiz-Martínez Towards a Privacy Web Scanner for End-Users. Search on Bibsonomy SSCC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Michael Grabatin, Wolfgang Hommel, Michael Steinke Policy-Based Network and Security Management in Federated Service Infrastructures with Permissioned Blockchains. Search on Bibsonomy SSCC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Prabhakar Krishnan, Krishnashree Achuthan Managing Network Functions in Stateful Application Aware SDN. Search on Bibsonomy SSCC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Musheer Ahmad 0002, Mohammad Najam Doja, M. M. Sufyan Beg A New Chaotic Map Based Secure and Efficient Pseudo-Random Bit Sequence Generation. Search on Bibsonomy SSCC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Divya Chaudhary, Bijendra Kumar, Shaksham Garg Diversity and Progress Controlled Gravitational Search Algorithm for Balancing Load in Cloud. Search on Bibsonomy SSCC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Tarun Yadav, Koustav Sadhukhan Identification of Bugs and Vulnerabilities in TLS Implementation for Windows Operating System Using State Machine Learning. Search on Bibsonomy SSCC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1B. Bharathi, J. Bhuvana Domain Name Detection and Classification Using Deep Neural Networks. Search on Bibsonomy SSCC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sumith Maniath, Prabaharan Poornachandran, V. G. Sujadevi Survey on Prevention, Mitigation and Containment of Ransomware Attacks. Search on Bibsonomy SSCC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yang Li, Jing-Ping Qiu, Qing Xie FinSec 3.0: Theory and Practices in Financial Enterprise. Search on Bibsonomy SSCC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hardik Gajera, Shruti Naik, Manik Lal Das MedCop: Verifiable Computation for Mobile Healthcare System. Search on Bibsonomy SSCC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Haroon Elahi, Guojun Wang 0001 A Participatory Privacy Protection Framework for Smart-Phone Application Default Settings. Search on Bibsonomy SSCC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Gaurav Mitra, Souradeep Barua, Srijan Chattopadhyay, Sukalyan Sen, Sarmistha Neogy Accessing Data in Healthcare Application. Search on Bibsonomy SSCC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1K. Rithesh, Adwaith V. Gautham, K. Chandrasekaran 0001 Network Anomaly Detection Using Artificial Neural Networks Optimised with PSO-DE Hybrid. Search on Bibsonomy SSCC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1V. Srinidhi, K. V. Lakshmy, Madathil Sethumadhavan HGKA: Hierarchical Dynamic Group Key Agreement Protocol for Machine Type Communication in LTE Networks. Search on Bibsonomy SSCC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Kamel Saddiki, Sofiane Boukli Hacene, Marc Gilg, Pascal Lorenz Trust-Neighbors-Based to Mitigate the Cooperative Black Hole Attack in OLSR Protocol. Search on Bibsonomy SSCC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Bandarupalli Chandini, M. Nirmala Devi 0001 Analysis of Circuits for Security Using Logic Encryption. Search on Bibsonomy SSCC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Siddharth Srinivasan, Akshay Kumar, Manik Mahajan, Dinkar Sitaram, Sanchika Gupta Probabilistic Real-Time Intrusion Detection System for Docker Containers. Search on Bibsonomy SSCC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Aniq Ur Rahman, Mayukh Bhattacharyya Hiding in Plain Sight - Symmetric Key Chaotic Image Encryption by Sequential Pixel Shuffling. Search on Bibsonomy SSCC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Harmeet Kaur Khanuja, Dattatraya S. Adane Detection of Suspicious Transactions with Database Forensics and Theory of Evidence. Search on Bibsonomy SSCC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Chhaya Choudhary, Raaghavi Sivaguru, Mayana Pereira, Bin Yu, Anderson C. A. Nascimento, Martine De Cock Algorithmically Generated Domain Detection and Malware Family Classification. Search on Bibsonomy SSCC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mohiuddin Ahmed, Al-Sakib Khan Pathan Investigating Deep Learning for Collective Anomaly Detection - An Experimental Study. Search on Bibsonomy SSCC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Chris Drake, Praveen Gauravaram Designing a User-Experience-First, Privacy-Respectful, High-Security Mutual-Multifactor Authentication Solution. Search on Bibsonomy SSCC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Dhenuka H. Kasukurti, Suchitra Patil Wearable Device Forensic: Probable Case Studies and Proposed Methodology. Search on Bibsonomy SSCC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Masayoshi Hayashi, Hiroaki Higaki Security Improvement of Common-Key Cryptographic Communication by Mixture of Fake Plain-Texts. Search on Bibsonomy SSCC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Akshay K. C., Balachandra Muniyal Analysis of Execution Time for Encryption During Data Integrity Check in Cloud Environment. Search on Bibsonomy SSCC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Anjani Barhanpure, Paaras Belandor, Bhaskarjyoti Das Proof of Stack Consensus for Blockchain Networks. Search on Bibsonomy SSCC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Khyati Vachhani Security Threats Against LTE Networks: A Survey. Search on Bibsonomy SSCC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sarvesh V. Sawant, Gaurav Pareek, B. R. Purushothama Group Key Management Schemes Under Strong Active Adversary Model: A Security Analysis. Search on Bibsonomy SSCC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1P. V. Jyothsna, Greeshma Prabha, K. K. Shahina, Anu Vazhayil Detecting DGA Using Deep Neural Networks (DNNs). Search on Bibsonomy SSCC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Naila Bushra, Naresh Adhikari, Mahalingam Ramkumar A TCB Minimizing Model of Computation. Search on Bibsonomy SSCC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mimi Cherian, Madhumita Chatterjee Survey of Security Threats in IoT and Emerging Countermeasures. Search on Bibsonomy SSCC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1S. V. Aswathy, K. V. Lakshmy BVD - A Blockchain Based Vehicle Database System. Search on Bibsonomy SSCC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1A. S. Joseph Charles, Kalavathi Palanisamy Attunement of Trickle Algorithm for Optimum Reliability of RPL over IoT. Search on Bibsonomy SSCC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Manju S. Nair, M. S. Rajasree Inverted Index Based Ranked Keyword Search in Multi-user Searchable Encryption. Search on Bibsonomy SSCC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Vyshak Suresh, R. Manimegalai SPIC - SRAM PUF Intergrated Chip Based Software Licensing Model. Search on Bibsonomy SSCC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1R. Madhusudhan, Shashidhara Mitigation of Cross-Site Scripting Attacks in Mobile Cloud Environments. Search on Bibsonomy SSCC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Josy Elsa Varghese, Balachandra Muniyal A Comparative Analysis of Different Soft Computing Techniques for Intrusion Detection System. Search on Bibsonomy SSCC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Kritika Kumari, Sayantani Saha, Sarmistha Neogy Cost Based Model for Secure Health Care Data Retrieval. Search on Bibsonomy SSCC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Pallavi Kumari Jha, Prem Shankar, V. G. Sujadevi, P. Prabhaharan DeepMal4J: Java Malware Detection Employing Deep Learning. Search on Bibsonomy SSCC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1R. Rashmi, D. V. N. Siva Kumar, P. Santhi Thilagam Privacy-Preserving Searchable Encryption Scheme over Encrypted Data Supporting Dynamic Update. Search on Bibsonomy SSCC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Gemini George, Sabu M. Thampi A Graph-Based Decision Support Model for Vulnerability Analysis in IoT Networks. Search on Bibsonomy SSCC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ratnavel Rajalakshmi, S. Ramraj, R. Ramesh Kannan Transfer Learning Approach for Identification of Malicious Domain Names. Search on Bibsonomy SSCC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sourav Saha 0002, Vanga Odelu, Rajendra Prasath Enhanced Session Initiation Protocols for Emergency Healthcare Applications. Search on Bibsonomy SSCC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ghanshyam S. Bopche, Gopal N. Rai, Babu M. Mehtre Inter-path Diversity Metrics for Increasing Networks Robustness Against Zero-Day Attacks. Search on Bibsonomy SSCC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Giuseppe Attardi, Daniele Sartiano Bidirectional LSTM Models for DGA Classification. Search on Bibsonomy SSCC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1A. P. Nandhini, M. Sai Bhavani, S. Dharani Dharan, N. Harish, M. Priyatharishini Effective Hardware Trojan Detection Using Front-End Compressive Sensing. Search on Bibsonomy SSCC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1K. Hemantha, Nidhi Desai, Manik Lal Das On Minimality Attack for Privacy-Preserving Data Publishing. Search on Bibsonomy SSCC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Falaah Arif Khan, Sajin Kunhambu, K. Chakravarthy G Behavioral Biometrics and Machine Learning to Secure Website Logins. Search on Bibsonomy SSCC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 317 (100 per page; Change: )
Pages: [1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license